Skip to main content

A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks

  • Conference paper
Communication and Networking (FGCN 2009)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 56))

Abstract

To detect replica nodes in a wireless sensor network, we propose a distributed, deterministic and resilient (DDR) replica detection protocol developed from a witness node based strategy. In DDR, while a location claim message of each node is sent towards the designated verification location in the network, the consistency of the messages is verified at intermediate nodes en route to its final destination. Compared with previous replication attack detection protocols, DDR achieves better computation and communication performance due to the use of symmetric key cryptography only and early replica detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, C., Shin, S., Park, C., Yoon, H.: A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks. IEICE Trans. on Letter, E92-D 7, 1479–1483 (2009)

    Google Scholar 

  2. Becher, A., Benenson, Z.: Maximillian Dornseif: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. Security in Pervasive Computing, 104–118 (2006)

    Google Scholar 

  3. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: Proc. of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 49–63 (2005)

    Google Scholar 

  4. Conti, M., Pietro, R.D., Mancini, L.V.: A Randomized, Efficient, and Distributed protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks. In: Proc. of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2007), pp. 80–89 (2007)

    Google Scholar 

  5. Zhu, B., Addada., V.G.K., Setia., S., Jajodia., S., Roy., S.: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. In: Computer Security Applications Conference (ACSAC 2007), pp. 257–267 (2007)

    Google Scholar 

  6. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public key cryptography for wireless sensor networks. In: Proc. of the Third IEEE International Conference on Pervasive Computing and Communications (PERCOM 2005), pp. 324–328 (2005)

    Google Scholar 

  7. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communication Security (CCS 2003), pp. 62–72 (2003)

    Google Scholar 

  8. Karp, B., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proc. of the 6th ACM International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 243–254 (2000)

    Google Scholar 

  9. Kaplan, E.D.: Understanidng GPS: Principles and Applications. Artech House, Boston, MA (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, C., Park, C., Hur, J., Lee, H., Yoon, H. (2009). A Distributed Deterministic and Resilient Replication Attack Detection Protocol in Wireless Sensor Networks. In: Ślęzak, D., Kim, Th., Chang, A.CC., Vasilakos, T., Li, M., Sakurai, K. (eds) Communication and Networking. FGCN 2009. Communications in Computer and Information Science, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10844-0_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10844-0_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10843-3

  • Online ISBN: 978-3-642-10844-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics